Authentication method using icon password
a technology of icon password and authentication method, applied in the field of authentication method using icon password, can solve the problem of inevitably leakage of password, and achieve the effect of preventing fundamentally leakage of password and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026]The detailed configuration of the invention will be hereafter described with reference to the accompanying drawings.
[0027]First, FIG. 1 shows constitutional components for performing the present invention, comprising a server 10 and terminals 20 connected through an electronic communication network, in addition to an icon database 11 and an authentication database 12 connected to the server 10.
[0028]Here, as shown in FIG. 1, the communication network may include a public switched telephone network (PSTN), a public switched data network (PSDN), a value added network (VAN), a local area network (LAN), a wide area network (WAN), the Internet, a mobile communication network, and the like. The communication networks listed above may not be an individual concept that can be physically and clearly distinguished. Since the present invention relates to a technique of authenticating a user, not to the configuration of the electronic communication network itself, or a technique of distri...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com